Have a personal or library account? Click to login
A Searchable Re-encryption Storage Method in Cloud Environment Cover
By: Wang Hui,  Hong Bo and  Tang Junyong  
Open Access
|May 2018

Figures & Tables

TABLE I.

SYMBOL DEFINITION
SYMBOL DEFINITION

TABLE II.

THE PERFORMANCE OF THE MOBILE END UPLOAD THE DATA
THE PERFORMANCE OF THE MOBILE END UPLOAD THE DATA

TABLE III.

THE PERFORMANCE OF THE MOBILE END DOWNLOAD THE DATA
THE PERFORMANCE OF THE MOBILE END DOWNLOAD THE DATA

TABLE IV.

TIME COMPARISON ON ENCRYPTION AND DECRYPTION BY USING SRECSM
TIME COMPARISON ON ENCRYPTION AND DECRYPTION BY USING SRECSM

Figure 1.

Comparison of Re-encryption time
Comparison of Re-encryption time

TABLE V.

TIME COMPARISON FOR DIFFERENT ALGORITHM ENCRYPTION
TIME COMPARISON FOR DIFFERENT ALGORITHM ENCRYPTION

Figure 2.

Comparison while increasing the number of keywords
Comparison while increasing the number of keywords

Figure 3.

Comparison while re-encryption and decryption
Comparison while re-encryption and decryption

Figure 4.

The reliability contrast diagram
The reliability contrast diagram
Language: English
Page range: 89 - 94
Published on: May 7, 2018
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2018 Wang Hui, Hong Bo, Tang Junyong, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.